Devices connect to WiFi but can't access internet

Hello I am using OpenWRT on an GL.iNet GL-AR750S (NOR/NAND). I m currently at 22.03.5 since I didn't have time yet to upgrade to 22.03.6 that came out today.

The problem I have is that some devices, mostly android devices, connect to the router but they don't actually receive internet. Even if android says that they are connected (which means that it thinks they have internet - otherwise it says that it's connected but there's no internet).

I have 2 linux laptops, connected to the same wifi but they never experienced problems. This first started happening on my android phone. A friend came with his windows laptop and he also had the same problem. And I tried my old phone today, a zl1 (Le Eco le pro 3) running lineageOS 18.1 and it also had the same problem. however two samsung devices in the house (A52/A53) have not been affected by the issue.

The router is connected to the ISP (FTTH) provided router which routes all traffic to the openWRT device through DMZ settings.

I am also running two TP-Link tl-wa860re in range extender mode with different SSID and DHCP off but they appear to not affect the problem. I have encountered the issue on my main phone even with them powered off. Sometimes I can actually sidestep the problem by having a device connect to them. This worked with my firend's windows laptop.

The problem itself is persistent but inconsistent. I 'd say - on my main phone - 50% of the time it is connected internet will not work and the other times it will work. It is very annoying as at one time you can use your phone and the next you cannot. Rebooting the router will sometimes fix the problem temporarily. Sometimes just waiting 15+min may fix the problem.

All affected client's devices do not experience this issue on other wifi devices (e.g. the neighbor's).

I 'm at a loss on what to do about it. Affected devices can connect to the router through LuCi so the communication between them is working fine. I can also ping them fine from other devices in the network. Any ideas?

Please run the following commands (copy-paste the whole block) and paste the output here, using the "Preformatted text </> " button:
grafik
Remember to redact passwords, MAC addresses and any public IP addresses you may have

ubus call system board; \
uci export network; uci export wireless; \
uci export dhcp; uci export firewall; \
head -n -0 /etc/firewall.user; \
iptables-save -c; ip6tables-save -c; nft list ruleset; \
ip -4 addr ; ip -4 ro li tab all ; ip -4 ru; \
ip -6 addr ; ip -6 ro li tab all ; ip -6 ru; \
ls -l  /etc/resolv.* /tmp/resolv.* /tmp/resolv.*/* ; head -n -0 /etc/resolv.* /tmp/resolv.* /tmp/resolv.*/*
2 Likes

Thank you for your reply. Here's the output you requested:

$ ubus call system board; \
> uci export network; uci export wireless; \
> uci export dhcp; uci export firewall; \
> head -n -0 /etc/firewall.user; \
> iptables-save -c; ip6tables-save -c; nft list ruleset; \
> ip -4 addr ; ip -4 ro li tab all ; ip -4 ru; \
> ip -6 addr ; ip -6 ro li tab all ; ip -6 ru; \
> ls -l  /etc/resolv.* /tmp/resolv.* /tmp/resolv.*/* ; head -n -0 /etc/resolv.* /tmp/resolv.* /tmp/resolv.*/*
{
	"kernel": "5.10.176",
	"hostname": "homerouter",
	"system": "Qualcomm Atheros QCA956X ver 1 rev 0",
	"model": "GL.iNet GL-AR750S (NOR/NAND)",
	"board_name": "glinet,gl-ar750s-nor-nand",
	"rootfs_type": "squashfs",
	"release": {
		"distribution": "OpenWrt",
		"version": "22.03.5",
		"revision": "r20134-5f15225c1e",
		"target": "ath79/nand",
		"description": "OpenWrt 22.03.5 r20134-5f15225c1e"
	}
}
package network

config interface 'loopback'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'
	option device 'lo'

config globals 'globals'
	option ula_prefix 'fdac:6db9:0e53::/48'

config interface 'lan'
	option proto 'static'
	option ipaddr '192.168.1.1'
	option netmask '255.255.255.0'
	option ip6assign '60'
	option device 'br-lan'
	list dns '1.1.1.1'
	list dns '8.8.8.8'
	list dns '9.9.9.9'

config interface 'wan'
	option proto 'dhcp'
	option device 'eth0.2'
	option peerdns '0'
	list dns '9.9.9.9'

config interface 'wan6'
	option proto 'dhcpv6'
	option device 'eth0.2'

config switch
	option name 'switch0'
	option reset '1'
	option enable_vlan '1'

config switch_vlan
	option device 'switch0'
	option vlan '1'
	option ports '2 3 0t'

config switch_vlan
	option device 'switch0'
	option vlan '2'
	option ports '1 0t'

config device
	option name 'br-lan'
	option type 'bridge'
	list ports 'eth0.1'

package wireless

config wifi-device 'radio0'
	option type 'mac80211'
	option channel '36'
	option hwmode '11a'
	option path 'pci0000:00/0000:00:00.0'
	option htmode 'VHT80'
	option disabled '1'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option ssid 'OpenWrt'
	option encryption 'none'

config wifi-device 'radio1'
	option type 'mac80211'
	option hwmode '11g'
	option htmode 'HT20'
	option country 'GR'
	option path 'platform/ahb/18100000.wmac'
	option channel 'auto'
	option cell_density '0'

config wifi-iface 'default_radio1'
	option device 'radio1'
	option network 'lan'
	option mode 'ap'
	option key '$wifi_pwd'
	option ssid '$wifi_ssid'
	option encryption 'psk2'

package dhcp

config dnsmasq
	option domainneeded '1'
	option localise_queries '1'
	option rebind_protection '1'
	option rebind_localhost '1'
	option expandhosts '1'
	option authoritative '1'
	option readethers '1'
	option leasefile '/tmp/dhcp.leases'
	option localservice '1'
	option domain 'lan'
	option local '/lan/'
	option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
	list server '1.1.1.1'
	list server '9.9.9.9'
	list server '8.8.8.8'

config dhcp 'lan'
	option interface 'lan'
	option start '100'
	option limit '150'
	option leasetime '12h'
	option dhcpv6 'server'
	option ra 'server'
	option ra_management '1'

config dhcp 'wan'
	option interface 'wan'
	option ignore '1'
	list ra_flags 'none'

config odhcpd 'odhcpd'
	option maindhcp '0'
	option leasefile '/tmp/hosts/odhcpd'
	option leasetrigger '/usr/sbin/odhcpd-update'
	option loglevel '4'

config host
	option dns '1'
	option mac '??:??:??:??:??:??'
	option name 'nextcloudpi'
	option ip '192.168.1.???'
	option duid '000100012abe8dac????????????'

config domain
	option name 'nextcloud.???.???'
	option ip '192.168.1.?1?'

config host
	option mac '??:??:??:??:??:??'
	option dns '1'
	option ip '192.168.1.?1?'
	option duid '0001000127d42404????????????'
	option name 'fedora??'

package firewall

config defaults
	option syn_flood '1'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'REJECT'

config zone
	option name 'lan'
	list network 'lan'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'

config zone
	option name 'wan'
	list network 'wan'
	list network 'wan6'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option masq '1'
	option mtu_fix '1'

config forwarding
	option src 'lan'
	option dest 'wan'

config rule
	option name 'Allow-DHCP-Renew'
	option src 'wan'
	option proto 'udp'
	option dest_port '68'
	option target 'ACCEPT'
	option family 'ipv4'

config rule
	option name 'Allow-Ping'
	option src 'wan'
	option proto 'icmp'
	option icmp_type 'echo-request'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-IGMP'
	option src 'wan'
	option proto 'igmp'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-DHCPv6'
	option src 'wan'
	option proto 'udp'
	option src_ip 'fc00::/6'
	option dest_ip 'fc00::/6'
	option dest_port '546'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-MLD'
	option src 'wan'
	option proto 'icmp'
	option src_ip 'fe80::/10'
	list icmp_type '130/0'
	list icmp_type '131/0'
	list icmp_type '132/0'
	list icmp_type '143/0'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Input'
	option src 'wan'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	list icmp_type 'router-solicitation'
	list icmp_type 'neighbour-solicitation'
	list icmp_type 'router-advertisement'
	list icmp_type 'neighbour-advertisement'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Forward'
	option src 'wan'
	option dest '*'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-IPSec-ESP'
	option src 'wan'
	option dest 'lan'
	option proto 'esp'
	option target 'ACCEPT'

config rule
	option name 'Allow-ISAKMP'
	option src 'wan'
	option dest 'lan'
	option dest_port '500'
	option proto 'udp'
	option target 'ACCEPT'

config include
	option path '/etc/firewall.user'

config redirect
	option dest_port '51413'
	option src 'wan'
	option name 'transmission-ishade'
	option src_dport '51413'
	option target 'DNAT'
	option dest_ip '192.168.1.???'
	option dest 'lan'
	option enabled '0'

config redirect
	option dest_port '443'
	option src 'wan'
	option name 'nextcloudpi-https'
	option src_dport '443'
	option target 'DNAT'
	option dest_ip '192.168.1.???'
	option dest 'lan'
	option enabled '0'

config redirect
	option dest_port '80'
	option src 'wan'
	option name 'nextcloudpi-http'
	option src_dport '80'
	option target 'DNAT'
	option dest_ip '192.168.1.???'
	option dest 'lan'
	option enabled '0'

config redirect
	option dest_port '1119'
	option src 'wan'
	option name 'battlenet-app'
	option src_dport '1119'
	option target 'DNAT'
	option dest_ip '192.168.1.???'
	option dest 'lan'
	option enabled '0'

config redirect
	option dest_port '80'
	option src 'wan'
	option name 'battlenet-app-http'
	option src_dport '80'
	option target 'DNAT'
	option dest_ip '192.168.1.???'
	option dest 'lan'
	option enabled '0'

config redirect
	option dest_port '443'
	option src 'wan'
	option name 'battlenet-app-https'
	option src_dport '443'
	option target 'DNAT'
	option dest_ip '192.168.1.???'
	option dest 'lan'
	option enabled '0'

config redirect
	option src 'wan'
	option src_dport '80'
	option target 'DNAT'
	option dest_ip '192.168.1.?1?'
	option dest 'lan'
	option name 'reverse-proxy-http'
	option dest_port '80'
	list proto 'tcp'

config redirect
	option src 'wan'
	option name 'reverse-proxy-https'
	option src_dport '443'
	option target 'DNAT'
	option dest_ip '192.168.1.?1?'
	option dest 'lan'
	option dest_port '443'
	list proto 'tcp'

head: /etc/firewall.user: No such file or directory
-ash: iptables-save: not found
-ash: ip6tables-save: not found
table inet fw4 {
	chain input {
		type filter hook input priority filter; policy accept;
		iifname "lo" accept comment "!fw4: Accept traffic from loopback"
		ct state established,related accept comment "!fw4: Allow inbound established and related flows"
		tcp flags syn / fin,syn,rst,ack jump syn_flood comment "!fw4: Rate limit TCP syn packets"
		iifname "br-lan" jump input_lan comment "!fw4: Handle lan IPv4/IPv6 input traffic"
		iifname "eth0.2" jump input_wan comment "!fw4: Handle wan IPv4/IPv6 input traffic"
	}

	chain forward {
		type filter hook forward priority filter; policy drop;
		ct state established,related accept comment "!fw4: Allow forwarded established and related flows"
		iifname "br-lan" jump forward_lan comment "!fw4: Handle lan IPv4/IPv6 forward traffic"
		iifname "eth0.2" jump forward_wan comment "!fw4: Handle wan IPv4/IPv6 forward traffic"
		jump handle_reject
	}

	chain output {
		type filter hook output priority filter; policy accept;
		oifname "lo" accept comment "!fw4: Accept traffic towards loopback"
		ct state established,related accept comment "!fw4: Allow outbound established and related flows"
		oifname "br-lan" jump output_lan comment "!fw4: Handle lan IPv4/IPv6 output traffic"
		oifname "eth0.2" jump output_wan comment "!fw4: Handle wan IPv4/IPv6 output traffic"
	}

	chain prerouting {
		type filter hook prerouting priority filter; policy accept;
		iifname "br-lan" jump helper_lan comment "!fw4: Handle lan IPv4/IPv6 helper assignment"
	}

	chain handle_reject {
		meta l4proto tcp reject with tcp reset comment "!fw4: Reject TCP traffic"
		reject comment "!fw4: Reject any other traffic"
	}

	chain syn_flood {
		limit rate 25/second burst 50 packets return comment "!fw4: Accept SYN packets below rate-limit"
		drop comment "!fw4: Drop excess packets"
	}

	chain input_lan {
		ct status dnat accept comment "!fw4: Accept port redirections"
		jump accept_from_lan
	}

	chain output_lan {
		jump accept_to_lan
	}

	chain forward_lan {
		jump accept_to_wan comment "!fw4: Accept lan to wan forwarding"
		ct status dnat accept comment "!fw4: Accept port forwards"
		jump accept_to_lan
	}

	chain helper_lan {
	}

	chain accept_from_lan {
		iifname "br-lan" counter packets 6728 bytes 547345 accept comment "!fw4: accept lan IPv4/IPv6 traffic"
	}

	chain accept_to_lan {
		oifname "br-lan" counter packets 1157 bytes 102589 accept comment "!fw4: accept lan IPv4/IPv6 traffic"
	}

	chain input_wan {
		meta nfproto ipv4 udp dport 68 counter packets 0 bytes 0 accept comment "!fw4: Allow-DHCP-Renew"
		icmp type echo-request counter packets 0 bytes 0 accept comment "!fw4: Allow-Ping"
		meta nfproto ipv4 meta l4proto igmp counter packets 0 bytes 0 accept comment "!fw4: Allow-IGMP"
		ip6 saddr fc00::/6 ip6 daddr fc00::/6 udp dport 546 counter packets 0 bytes 0 accept comment "!fw4: Allow-DHCPv6"
		ip6 saddr fe80::/10 icmpv6 type . icmpv6 code { mld-listener-query . no-route, mld-listener-report . no-route, mld-listener-done . no-route, mld2-listener-report . no-route } counter packets 0 bytes 0 accept comment "!fw4: Allow-MLD"
		icmpv6 type { destination-unreachable, time-exceeded, echo-request, echo-reply, nd-router-solicit, nd-router-advert } limit rate 1000/second counter packets 42 bytes 3024 accept comment "!fw4: Allow-ICMPv6-Input"
		icmpv6 type . icmpv6 code { packet-too-big . no-route, parameter-problem . no-route, parameter-problem . admin-prohibited, nd-neighbor-solicit . no-route, nd-neighbor-advert . no-route } limit rate 1000/second counter packets 117 bytes 8112 accept comment "!fw4: Allow-ICMPv6-Input"
		ct status dnat accept comment "!fw4: Accept port redirections"
		jump reject_from_wan
	}

	chain output_wan {
		jump accept_to_wan
	}

	chain forward_wan {
		icmpv6 type { destination-unreachable, time-exceeded, echo-request, echo-reply } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Forward"
		icmpv6 type . icmpv6 code { packet-too-big . no-route, parameter-problem . no-route, parameter-problem . admin-prohibited } limit rate 1000/second counter packets 0 bytes 0 accept comment "!fw4: Allow-ICMPv6-Forward"
		meta l4proto esp counter packets 0 bytes 0 jump accept_to_lan comment "!fw4: Allow-IPSec-ESP"
		udp dport 500 counter packets 0 bytes 0 jump accept_to_lan comment "!fw4: Allow-ISAKMP"
		ct status dnat accept comment "!fw4: Accept port forwards"
		jump reject_to_wan
	}

	chain accept_to_wan {
		oifname "eth0.2" counter packets 39763 bytes 4087295 accept comment "!fw4: accept wan IPv4/IPv6 traffic"
	}

	chain reject_from_wan {
		iifname "eth0.2" counter packets 65179 bytes 3949228 jump handle_reject comment "!fw4: reject wan IPv4/IPv6 traffic"
	}

	chain reject_to_wan {
		oifname "eth0.2" counter packets 0 bytes 0 jump handle_reject comment "!fw4: reject wan IPv4/IPv6 traffic"
	}

	chain dstnat {
		type nat hook prerouting priority dstnat; policy accept;
		iifname "br-lan" jump dstnat_lan comment "!fw4: Handle lan IPv4/IPv6 dstnat traffic"
		iifname "eth0.2" jump dstnat_wan comment "!fw4: Handle wan IPv4/IPv6 dstnat traffic"
	}

	chain srcnat {
		type nat hook postrouting priority srcnat; policy accept;
		oifname "br-lan" jump srcnat_lan comment "!fw4: Handle lan IPv4/IPv6 srcnat traffic"
		oifname "eth0.2" jump srcnat_wan comment "!fw4: Handle wan IPv4/IPv6 srcnat traffic"
	}

	chain dstnat_lan {
		ip saddr 192.168.1.0/24 ip daddr 192.168.100.?r? tcp dport 80 dnat ip to 192.168.1.?1?:80 comment "!fw4: reverse-proxy-http (reflection)"
		ip saddr 192.168.1.0/24 ip daddr 192.168.100.?r? tcp dport 443 dnat ip to 192.168.1.?1?:443 comment "!fw4: reverse-proxy-https (reflection)"
	}

	chain srcnat_lan {
		ip saddr 192.168.1.0/24 ip daddr 192.168.1.?1? tcp dport 80 snat ip to 192.168.1.1 comment "!fw4: reverse-proxy-http (reflection)"
		ip saddr 192.168.1.0/24 ip daddr 192.168.1.?1? tcp dport 443 snat ip to 192.168.1.1 comment "!fw4: reverse-proxy-https (reflection)"
	}

	chain dstnat_wan {
		meta nfproto ipv4 tcp dport 80 counter packets 19 bytes 944 dnat ip to 192.168.1.?1?:80 comment "!fw4: reverse-proxy-http"
		meta nfproto ipv4 tcp dport 443 counter packets 36 bytes 2000 dnat ip to 192.168.1.?1?:443 comment "!fw4: reverse-proxy-https"
	}

	chain srcnat_wan {
		meta nfproto ipv4 masquerade comment "!fw4: Masquerade IPv4 wan traffic"
	}

	chain raw_prerouting {
		type filter hook prerouting priority raw; policy accept;
	}

	chain raw_output {
		type filter hook output priority raw; policy accept;
	}

	chain mangle_prerouting {
		type filter hook prerouting priority mangle; policy accept;
	}

	chain mangle_postrouting {
		type filter hook postrouting priority mangle; policy accept;
	}

	chain mangle_input {
		type filter hook input priority mangle; policy accept;
	}

	chain mangle_output {
		type route hook output priority mangle; policy accept;
	}

	chain mangle_forward {
		type filter hook forward priority mangle; policy accept;
		iifname "eth0.2" tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wan IPv4/IPv6 ingress MTU fixing"
		oifname "eth0.2" tcp flags syn tcp option maxseg size set rt mtu comment "!fw4: Zone wan IPv4/IPv6 egress MTU fixing"
	}
}
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
6: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
    inet 192.168.1.1/24 brd 192.168.1.255 scope global br-lan
       valid_lft forever preferred_lft forever
8: eth0.2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
    inet 192.168.100.?r?/24 brd 192.168.100.255 scope global eth0.2
       valid_lft forever preferred_lft forever
default via 192.168.100.1 dev eth0.2  src 192.168.100.?r? 
192.168.1.0/24 dev br-lan scope link  src 192.168.1.1 
192.168.100.0/24 dev eth0.2 scope link  src 192.168.100.?r? 
broadcast 127.0.0.0 dev lo table local scope link  src 127.0.0.1 
local 127.0.0.0/8 dev lo table local scope host  src 127.0.0.1 
local 127.0.0.1 dev lo table local scope host  src 127.0.0.1 
broadcast 127.255.255.255 dev lo table local scope link  src 127.0.0.1 
broadcast 192.168.1.0 dev br-lan table local scope link  src 192.168.1.1 
local 192.168.1.1 dev br-lan table local scope host  src 192.168.1.1 
broadcast 192.168.1.255 dev br-lan table local scope link  src 192.168.1.1 
broadcast 192.168.100.0 dev eth0.2 table local scope link  src 192.168.100.?r? 
local 192.168.100.?r? dev eth0.2 table local scope host  src 192.168.100.?r? 
broadcast 192.168.100.255 dev eth0.2 table local scope link  src 192.168.100.?r? 
0:	from all lookup local 
32766:	from all lookup main 
32767:	from all lookup default 
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 state UNKNOWN qlen 1000
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::9683:c4ff:fe01:255c/64 scope link 
       valid_lft forever preferred_lft forever
6: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fdac:6db9:e53::1/60 scope global noprefixroute 
       valid_lft forever preferred_lft forever
    inet6 fe80::9683:c4ff:fe01:255c/64 scope link 
       valid_lft forever preferred_lft forever
8: eth0.2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::9683:c4ff:fe01:255c/64 scope link 
       valid_lft forever preferred_lft forever
9: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::9683:c4ff:fe01:255c/64 scope link 
       valid_lft forever preferred_lft forever
fdac:6db9:e53::/64 dev br-lan  metric 1024 
unreachable fdac:6db9:e53::/48 dev lo  metric 2147483647 
fe80::/64 dev eth0  metric 256 
fe80::/64 dev eth0.2  metric 256 
fe80::/64 dev br-lan  metric 256 
fe80::/64 dev wlan1  metric 256 
local ::1 dev lo table local  metric 0 
anycast fdac:6db9:e53:: dev br-lan table local  metric 0 
local fdac:6db9:e53::1 dev br-lan table local  metric 0 
anycast fe80:: dev eth0.2 table local  metric 0 
anycast fe80:: dev eth0 table local  metric 0 
anycast fe80:: dev br-lan table local  metric 0 
anycast fe80:: dev wlan1 table local  metric 0 
local fe80::9683:c4ff:fe01:255c dev eth0.2 table local  metric 0 
local fe80::9683:c4ff:fe01:255c dev eth0 table local  metric 0 
local fe80::9683:c4ff:fe01:255c dev br-lan table local  metric 0 
local fe80::9683:c4ff:fe01:255c dev wlan1 table local  metric 0 
multicast ff00::/8 dev eth0 table local  metric 256 
multicast ff00::/8 dev br-lan table local  metric 256 
multicast ff00::/8 dev eth0.2 table local  metric 256 
multicast ff00::/8 dev wlan1 table local  metric 256 
0:	from all lookup local 
32766:	from all lookup main 
lrwxrwxrwx    1 root     root            16 Apr 27  2023 /etc/resolv.conf -> /tmp/resolv.conf
-rw-r--r--    1 root     root            47 Dec  5 09:50 /tmp/resolv.conf
-rw-r--r--    1 root     root           108 Dec  1 20:23 /tmp/resolv.conf.d/resolv.conf.auto

/tmp/resolv.conf.d:
-rw-r--r--    1 root     root           108 Dec  1 20:23 resolv.conf.auto
==> /etc/resolv.conf <==
search lan
nameserver 127.0.0.1
nameserver ::1

==> /tmp/resolv.conf <==
search lan
nameserver 127.0.0.1
nameserver ::1

==> /tmp/resolv.conf.d <==
head: /tmp/resolv.conf.d: I/O error

==> /tmp/resolv.conf.d/resolv.conf.auto <==
# Interface lan
nameserver 1.1.1.1
nameserver 8.8.8.8
nameserver 9.9.9.9
# Interface wan
nameserver 9.9.9.9
$

To further clarify. The network has 2 devices (rpi4 based) running nextcloudpi and swag from linuxserverio. swag device's IP has been abbreviated as 192.168.1.?1?. Also the openWRT router's IP in the ISP optical modem/router has been abbreviated as 192.168.1.?r?. Note that from the port fowarding rules visible on the text only the last two related to swag+nextcloudpi functionality are enabled. Also note that the swag+nextcloudpi setup has been running from before the wifi connectivity issues arose.

Hope this helps.

P.S. Also note that while I can use the command line, I prefer luci for OpenWRT because I don't know enough to be confident in setting things up from there.

I'm not completely used to parsing UCI conf files myself, but I'm pretty sure DHCPv4 is not active for your LAN, router is only leasing IPv6 addresses. Android does not implement DHCPv6 which results in spotty connection, and you need to enable SLAAC:

Alternatively, if you're getting IPv4 from upstream and you're fine with Android getting only v4 access, you can simply enable DHCPv4 function for br-lan. I'll suggest you do this even if you do configure SLAAC and get IPv6 working properly, because lot of the internet still only has v4 connectivity.

2 Likes

Thank you for the reply. This looks to be a likely cause for my issue. It will take me some time to get familiar with what I need to do and test it. I will read up on the material and make the changes I need. I 'll post here with the results once I 've done so.

1 Like